{"id":3610,"date":"2023-02-16T15:11:30","date_gmt":"2023-02-16T23:11:30","guid":{"rendered":"https:\/\/tekedgeconsulting.com\/beta1\/?post_type=glossary&#038;p=3610"},"modified":"2023-02-16T15:43:35","modified_gmt":"2023-02-16T23:43:35","slug":"pwned","status":"publish","type":"glossary","link":"https:\/\/tekedgeconsulting.com\/beta1\/glossary\/pwned\/","title":{"rendered":"Pwned"},"content":{"rendered":"<p>The term &#8220;pwned&#8221; is a slang term used to describe when someone has been hacked, defeated, or taken advantage of in some way. It is derived from the word &#8220;owned&#8221; and is commonly used in online gaming and on the Internet as a whole. It is a way of acknowledging that someone has been outwitted or had a vulnerability exposed. As a result of its usage, many people have started to use it as a verb, as in, &#8220;I was just pwned.&#8221;<\/p>\n<h5>Do you know if you have you been pwned?<\/h5>\n<p>You can check your username(s) and\/or phone number(s) here <a href=\"https:\/\/haveibeenpwned.com\/\" target=\"_blank\" rel=\"noopener\">https:\/\/haveibeenpwned.com<\/a>. There is a high probability of finding your username(s) and\/or phone number(s) listed here. Not ideal, but also not alarming.<\/p>\n<p>You can check your password(s) here\u00a0<a href=\"https:\/\/haveibeenpwned.com\/Passwords\" target=\"_blank\" rel=\"noopener\">https:\/\/haveibeenpwned.com\/Passwords<\/a><br \/>\n<strong><span style=\"color: #ff0000;\">NOTE<\/span><\/strong> &#8211; if you find that a password of yours is listed on the Pwned Passwords page, you should <strong><span style=\"text-decoration: underline;\">IMMEDIATELY<\/span><\/strong> change the password anywhere you have used it. This is both not ideal and very alarming!<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The term &#8220;pwned&#8221; is a slang term used to describe when someone has been hacked, defeated, or taken advantage of in some way. It is derived from the word &#8220;owned&#8221; and is commonly used in online gaming and on the Internet as a whole. It is a way of acknowledging that someone has been outwitted [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":3611,"menu_order":0,"template":"","meta":{"_acf_changed":false,"inline_featured_image":false,"cybocfi_hide_featured_image":"yes","footnotes":""},"glossary-categories":[119,118],"glossary-tags":[125,123,122],"class_list":["post-3610","glossary","type-glossary","status-publish","has-post-thumbnail","hentry","glossary-categories-passwords","glossary-categories-security","glossary-tags-cyber-crime","glossary-tags-passwords","glossary-tags-security"],"acf":[],"_links":{"self":[{"href":"https:\/\/tekedgeconsulting.com\/beta1\/wp-json\/wp\/v2\/glossary\/3610","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/tekedgeconsulting.com\/beta1\/wp-json\/wp\/v2\/glossary"}],"about":[{"href":"https:\/\/tekedgeconsulting.com\/beta1\/wp-json\/wp\/v2\/types\/glossary"}],"author":[{"embeddable":true,"href":"https:\/\/tekedgeconsulting.com\/beta1\/wp-json\/wp\/v2\/users\/1"}],"version-history":[{"count":5,"href":"https:\/\/tekedgeconsulting.com\/beta1\/wp-json\/wp\/v2\/glossary\/3610\/revisions"}],"predecessor-version":[{"id":3620,"href":"https:\/\/tekedgeconsulting.com\/beta1\/wp-json\/wp\/v2\/glossary\/3610\/revisions\/3620"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/tekedgeconsulting.com\/beta1\/wp-json\/wp\/v2\/media\/3611"}],"wp:attachment":[{"href":"https:\/\/tekedgeconsulting.com\/beta1\/wp-json\/wp\/v2\/media?parent=3610"}],"wp:term":[{"taxonomy":"glossary-categories","embeddable":true,"href":"https:\/\/tekedgeconsulting.com\/beta1\/wp-json\/wp\/v2\/glossary-categories?post=3610"},{"taxonomy":"glossary-tags","embeddable":true,"href":"https:\/\/tekedgeconsulting.com\/beta1\/wp-json\/wp\/v2\/glossary-tags?post=3610"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}